Critical security concerns facing the energy & utility industry

| | General Security
A perfect storm of technical & human vulnerabilities The global dependency and wide use of utility companies makes the system highly vulnerable to both natural and human-made disasters. This... Go on to the site to read the full article ... Read More

Critical security concerns facing the technology industry

| | General Security
Executive summary Of the top five most valuable brands in North America in 2019, four were information technology companies. Information technology has provided a backbone of innovation that is... Go on to the site to read the full article ... Read More

Zoombombing: How it works and how to prevent it from happening to you

Introduction COVID-19 is likely to be the Oxford English Dictionary’s word of the year for 2020. But as well as entering our lexicon across the world, it has also changed us at a cultural level. One... Go on to the site to read the full article ... Read More

The business value of the CompTIA CASP+ employee certification

Introduction Cybersecurity breaches continue to present serious challenges to organizations across every sector and of every size. In the first nine months of 2019, 7.9 billion data records were... Go on to the site to read the full article ... Read More

The business value of the CompTIA PenTest+ employee certification

Introduction Vulnerabilities in our technology-enabled systems and services are the Achilles heel of our extended IT networks. In 2019, CVE Details recorded 16,556 such vulnerabilities across... Go on to the site to read the full article ... Read More

Top Cyber Security Risks in Healthcare [Updated 2020]

Executive summary The healthcare industry is a prime target for cybercriminals. Stolen protected health information (PHI) is worth hundreds, even thousands of dollars on the black market. For... Go on to the site to read the full article ... Read More

Keeping Alexa out of the boardroom (and the bedroom office): IoT security tips for remote employees

| | General Security
Introduction I can’t help myself. I find myself liking Alexa. She/he/it isn’t exactly a friend, but I can play music and find out the weather and do all sorts of things. I tell myself that Alexa is... Go on to the site to read the full article ... Read More

False impressions: How fake attribution makes fools of us all

| | General Security
Introduction In 2018, the world was faced with the Ryuk ransomware strain. The responsibility for this ransomware attack was originally placed squarely in the camp of a state-sponsored North Korean... Go on to the site to read the full article ... Read More

How hackers check to see if your website is hackable

| | Hacking
Introduction “Memento mori” is Latin for “Remember that you are mortal.” According to tradition, this phrase was whispered to triumphant Roman military commanders on parades, to remind them they... Go on to the site to read the full article ... Read More

Ways to protect your mobile applications against hacking

| | General Security
Introduction The increase in the use of mobile applications comes with an increase in hackers targeting them. A Symantec survey found that 1 in 36 devices had high-risk apps installed. Mobile... Go on to the site to read the full article ... Read More